amazonka-apigateway-2.0: Amazon API Gateway SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.APIGateway.Types.TlsConfig

Description

 
Synopsis

Documentation

data TlsConfig Source #

Specifies the TLS configuration for an integration.

See: newTlsConfig smart constructor.

Constructors

TlsConfig' 

Fields

  • insecureSkipVerification :: Maybe Bool

    Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway still performs basic certificate validation, which includes checking the certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY integrations.

    Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle attacks.

Instances

Instances details
FromJSON TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

ToJSON TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

Generic TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

Associated Types

type Rep TlsConfig :: Type -> Type #

Read TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

Show TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

NFData TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

Methods

rnf :: TlsConfig -> () #

Eq TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

Hashable TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

type Rep TlsConfig Source # 
Instance details

Defined in Amazonka.APIGateway.Types.TlsConfig

type Rep TlsConfig = D1 ('MetaData "TlsConfig" "Amazonka.APIGateway.Types.TlsConfig" "amazonka-apigateway-2.0-zw0Lbt4rUGxZBjJ4Rpfi" 'False) (C1 ('MetaCons "TlsConfig'" 'PrefixI 'True) (S1 ('MetaSel ('Just "insecureSkipVerification") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Bool))))

newTlsConfig :: TlsConfig Source #

Create a value of TlsConfig with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:insecureSkipVerification:TlsConfig', tlsConfig_insecureSkipVerification - Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway still performs basic certificate validation, which includes checking the certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY integrations.

Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle attacks.

tlsConfig_insecureSkipVerification :: Lens' TlsConfig (Maybe Bool) Source #

Specifies whether or not API Gateway skips verification that the certificate for an integration endpoint is issued by a supported certificate authority. This isn’t recommended, but it enables you to use certificates that are signed by private certificate authorities, or certificates that are self-signed. If enabled, API Gateway still performs basic certificate validation, which includes checking the certificate's expiration date, hostname, and presence of a root certificate authority. Supported only for HTTP and HTTP_PROXY integrations.

Enabling insecureSkipVerification isn't recommended, especially for integrations with public HTTPS endpoints. If you enable insecureSkipVerification, you increase the risk of man-in-the-middle attacks.